Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.034708] ==================================================================
[   18.034783] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.034889] Read of size 1 at addr fff00000c63d6773 by task kunit_try_catch/196
[   18.034942] 
[   18.034971] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.035072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.035119] Hardware name: linux,dummy-virt (DT)
[   18.035167] Call trace:
[   18.035217]  show_stack+0x20/0x38 (C)
[   18.035266]  dump_stack_lvl+0x8c/0xd0
[   18.035314]  print_report+0x118/0x608
[   18.035371]  kasan_report+0xdc/0x128
[   18.035507]  __asan_report_load1_noabort+0x20/0x30
[   18.035593]  ksize_unpoisons_memory+0x628/0x740
[   18.035680]  kunit_try_run_case+0x170/0x3f0
[   18.035745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.035818]  kthread+0x328/0x630
[   18.035886]  ret_from_fork+0x10/0x20
[   18.035951] 
[   18.035989] Allocated by task 196:
[   18.036055]  kasan_save_stack+0x3c/0x68
[   18.036122]  kasan_save_track+0x20/0x40
[   18.036178]  kasan_save_alloc_info+0x40/0x58
[   18.036243]  __kasan_kmalloc+0xd4/0xd8
[   18.036329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.036431]  ksize_unpoisons_memory+0xc0/0x740
[   18.036471]  kunit_try_run_case+0x170/0x3f0
[   18.036511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.036555]  kthread+0x328/0x630
[   18.036591]  ret_from_fork+0x10/0x20
[   18.036627] 
[   18.036645] The buggy address belongs to the object at fff00000c63d6700
[   18.036645]  which belongs to the cache kmalloc-128 of size 128
[   18.036704] The buggy address is located 0 bytes to the right of
[   18.036704]  allocated 115-byte region [fff00000c63d6700, fff00000c63d6773)
[   18.036896] 
[   18.036958] The buggy address belongs to the physical page:
[   18.037007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.037108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.037156] page_type: f5(slab)
[   18.037454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.037532] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.037631] page dumped because: kasan: bad access detected
[   18.037734] 
[   18.037796] Memory state around the buggy address:
[   18.037849]  fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.037910]  fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.037970] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.038075]                                                              ^
[   18.038134]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038187]  fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.038226] ==================================================================
[   18.038864] ==================================================================
[   18.038914] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.038989] Read of size 1 at addr fff00000c63d6778 by task kunit_try_catch/196
[   18.039057] 
[   18.039095] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.039199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.039247] Hardware name: linux,dummy-virt (DT)
[   18.039295] Call trace:
[   18.039353]  show_stack+0x20/0x38 (C)
[   18.039430]  dump_stack_lvl+0x8c/0xd0
[   18.039496]  print_report+0x118/0x608
[   18.039541]  kasan_report+0xdc/0x128
[   18.039626]  __asan_report_load1_noabort+0x20/0x30
[   18.039677]  ksize_unpoisons_memory+0x618/0x740
[   18.039745]  kunit_try_run_case+0x170/0x3f0
[   18.039987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.040051]  kthread+0x328/0x630
[   18.040096]  ret_from_fork+0x10/0x20
[   18.040234] 
[   18.040270] Allocated by task 196:
[   18.040320]  kasan_save_stack+0x3c/0x68
[   18.040405]  kasan_save_track+0x20/0x40
[   18.040481]  kasan_save_alloc_info+0x40/0x58
[   18.040588]  __kasan_kmalloc+0xd4/0xd8
[   18.040646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.040775]  ksize_unpoisons_memory+0xc0/0x740
[   18.040863]  kunit_try_run_case+0x170/0x3f0
[   18.040975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.041028]  kthread+0x328/0x630
[   18.041063]  ret_from_fork+0x10/0x20
[   18.041099] 
[   18.041119] The buggy address belongs to the object at fff00000c63d6700
[   18.041119]  which belongs to the cache kmalloc-128 of size 128
[   18.041175] The buggy address is located 5 bytes to the right of
[   18.041175]  allocated 115-byte region [fff00000c63d6700, fff00000c63d6773)
[   18.041239] 
[   18.041259] The buggy address belongs to the physical page:
[   18.041329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.041392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.041440] page_type: f5(slab)
[   18.041567] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.041652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.041711] page dumped because: kasan: bad access detected
[   18.041803] 
[   18.041907] Memory state around the buggy address:
[   18.041975]  fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.042040]  fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042139] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.042225]                                                                 ^
[   18.042308]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042436]  fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042484] ==================================================================
[   18.043653] ==================================================================
[   18.043731] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.043782] Read of size 1 at addr fff00000c63d677f by task kunit_try_catch/196
[   18.043852] 
[   18.043901] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.044008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.044056] Hardware name: linux,dummy-virt (DT)
[   18.044101] Call trace:
[   18.044141]  show_stack+0x20/0x38 (C)
[   18.044207]  dump_stack_lvl+0x8c/0xd0
[   18.044256]  print_report+0x118/0x608
[   18.044364]  kasan_report+0xdc/0x128
[   18.044440]  __asan_report_load1_noabort+0x20/0x30
[   18.044517]  ksize_unpoisons_memory+0x690/0x740
[   18.044567]  kunit_try_run_case+0x170/0x3f0
[   18.044615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.044670]  kthread+0x328/0x630
[   18.044714]  ret_from_fork+0x10/0x20
[   18.044760] 
[   18.044777] Allocated by task 196:
[   18.044805]  kasan_save_stack+0x3c/0x68
[   18.044844]  kasan_save_track+0x20/0x40
[   18.045004]  kasan_save_alloc_info+0x40/0x58
[   18.045075]  __kasan_kmalloc+0xd4/0xd8
[   18.045180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.045248]  ksize_unpoisons_memory+0xc0/0x740
[   18.045331]  kunit_try_run_case+0x170/0x3f0
[   18.045434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.045520]  kthread+0x328/0x630
[   18.045633]  ret_from_fork+0x10/0x20
[   18.045701] 
[   18.045774] The buggy address belongs to the object at fff00000c63d6700
[   18.045774]  which belongs to the cache kmalloc-128 of size 128
[   18.045893] The buggy address is located 12 bytes to the right of
[   18.045893]  allocated 115-byte region [fff00000c63d6700, fff00000c63d6773)
[   18.045997] 
[   18.046016] The buggy address belongs to the physical page:
[   18.046045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.046283] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.046417] page_type: f5(slab)
[   18.046496] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.046603] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.046688] page dumped because: kasan: bad access detected
[   18.046747] 
[   18.046792] Memory state around the buggy address:
[   18.046908]  fff00000c63d6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.046972]  fff00000c63d6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047014] >fff00000c63d6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.047102]                                                                 ^
[   18.047170]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047254]  fff00000c63d6800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.047370] ==================================================================

[   11.756513] ==================================================================
[   11.756951] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0
[   11.757718] Read of size 1 at addr ffff8881035ebf7f by task kunit_try_catch/214
[   11.758093] 
[   11.758210] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.758254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.758266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.758288] Call Trace:
[   11.758304]  <TASK>
[   11.758319]  dump_stack_lvl+0x73/0xb0
[   11.758346]  print_report+0xd1/0x650
[   11.758370]  ? __virt_addr_valid+0x1db/0x2d0
[   11.758392]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.758412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.758435]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.758455]  kasan_report+0x141/0x180
[   11.758478]  ? ksize_unpoisons_memory+0x7b6/0x9b0
[   11.758504]  __asan_report_load1_noabort+0x18/0x20
[   11.758535]  ksize_unpoisons_memory+0x7b6/0x9b0
[   11.758556]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.758576]  ? finish_task_switch.isra.0+0x153/0x700
[   11.758600]  ? __switch_to+0x5d9/0xf60
[   11.758621]  ? dequeue_task_fair+0x156/0x4e0
[   11.758645]  ? __schedule+0x10cc/0x2b60
[   11.758669]  ? __pfx_read_tsc+0x10/0x10
[   11.758690]  ? ktime_get_ts64+0x86/0x230
[   11.758715]  kunit_try_run_case+0x1a5/0x480
[   11.758736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.758755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.758779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.758804]  ? __kthread_parkme+0x82/0x180
[   11.758825]  ? preempt_count_sub+0x50/0x80
[   11.758935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.758960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.758983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.759007]  kthread+0x337/0x6f0
[   11.759025]  ? trace_preempt_on+0x20/0xc0
[   11.759048]  ? __pfx_kthread+0x10/0x10
[   11.759067]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.759089]  ? calculate_sigpending+0x7b/0xa0
[   11.759111]  ? __pfx_kthread+0x10/0x10
[   11.759130]  ret_from_fork+0x41/0x80
[   11.759152]  ? __pfx_kthread+0x10/0x10
[   11.759170]  ret_from_fork_asm+0x1a/0x30
[   11.759200]  </TASK>
[   11.759212] 
[   11.767454] Allocated by task 214:
[   11.767646]  kasan_save_stack+0x45/0x70
[   11.767908]  kasan_save_track+0x18/0x40
[   11.768092]  kasan_save_alloc_info+0x3b/0x50
[   11.768241]  __kasan_kmalloc+0xb7/0xc0
[   11.768436]  __kmalloc_cache_noprof+0x189/0x420
[   11.768657]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.768952]  kunit_try_run_case+0x1a5/0x480
[   11.769110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.769367]  kthread+0x337/0x6f0
[   11.769499]  ret_from_fork+0x41/0x80
[   11.769632]  ret_from_fork_asm+0x1a/0x30
[   11.769772] 
[   11.769846] The buggy address belongs to the object at ffff8881035ebf00
[   11.769846]  which belongs to the cache kmalloc-128 of size 128
[   11.770401] The buggy address is located 12 bytes to the right of
[   11.770401]  allocated 115-byte region [ffff8881035ebf00, ffff8881035ebf73)
[   11.771049] 
[   11.771127] The buggy address belongs to the physical page:
[   11.771299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb
[   11.771791] flags: 0x200000000000000(node=0|zone=2)
[   11.772224] page_type: f5(slab)
[   11.772412] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.772812] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.773188] page dumped because: kasan: bad access detected
[   11.773364] 
[   11.773435] Memory state around the buggy address:
[   11.773659]  ffff8881035ebe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.773999]  ffff8881035ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.774497] >ffff8881035ebf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.774768]                                                                 ^
[   11.774996]  ffff8881035ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.775403]  ffff8881035ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.775794] ==================================================================
[   11.731518] ==================================================================
[   11.731844] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0
[   11.732360] Read of size 1 at addr ffff8881035ebf78 by task kunit_try_catch/214
[   11.732825] 
[   11.732929] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.732974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.732986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.733021] Call Trace:
[   11.733038]  <TASK>
[   11.733052]  dump_stack_lvl+0x73/0xb0
[   11.733077]  print_report+0xd1/0x650
[   11.733281]  ? __virt_addr_valid+0x1db/0x2d0
[   11.733359]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.733379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.733402]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.733422]  kasan_report+0x141/0x180
[   11.733446]  ? ksize_unpoisons_memory+0x7e9/0x9b0
[   11.733471]  __asan_report_load1_noabort+0x18/0x20
[   11.733492]  ksize_unpoisons_memory+0x7e9/0x9b0
[   11.733523]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.733543]  ? finish_task_switch.isra.0+0x153/0x700
[   11.733567]  ? __switch_to+0x5d9/0xf60
[   11.733589]  ? dequeue_task_fair+0x156/0x4e0
[   11.733613]  ? __schedule+0x10cc/0x2b60
[   11.733637]  ? __pfx_read_tsc+0x10/0x10
[   11.733657]  ? ktime_get_ts64+0x86/0x230
[   11.733682]  kunit_try_run_case+0x1a5/0x480
[   11.733704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.733723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.733748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.733772]  ? __kthread_parkme+0x82/0x180
[   11.733794]  ? preempt_count_sub+0x50/0x80
[   11.733818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.733854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.733889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.733913]  kthread+0x337/0x6f0
[   11.733930]  ? trace_preempt_on+0x20/0xc0
[   11.733954]  ? __pfx_kthread+0x10/0x10
[   11.733973]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.733995]  ? calculate_sigpending+0x7b/0xa0
[   11.734017]  ? __pfx_kthread+0x10/0x10
[   11.734036]  ret_from_fork+0x41/0x80
[   11.734057]  ? __pfx_kthread+0x10/0x10
[   11.734076]  ret_from_fork_asm+0x1a/0x30
[   11.734106]  </TASK>
[   11.734117] 
[   11.745005] Allocated by task 214:
[   11.745205]  kasan_save_stack+0x45/0x70
[   11.745386]  kasan_save_track+0x18/0x40
[   11.745925]  kasan_save_alloc_info+0x3b/0x50
[   11.746226]  __kasan_kmalloc+0xb7/0xc0
[   11.746398]  __kmalloc_cache_noprof+0x189/0x420
[   11.746740]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.747041]  kunit_try_run_case+0x1a5/0x480
[   11.747210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.747462]  kthread+0x337/0x6f0
[   11.747891]  ret_from_fork+0x41/0x80
[   11.748091]  ret_from_fork_asm+0x1a/0x30
[   11.748275] 
[   11.748502] The buggy address belongs to the object at ffff8881035ebf00
[   11.748502]  which belongs to the cache kmalloc-128 of size 128
[   11.749286] The buggy address is located 5 bytes to the right of
[   11.749286]  allocated 115-byte region [ffff8881035ebf00, ffff8881035ebf73)
[   11.750197] 
[   11.750308] The buggy address belongs to the physical page:
[   11.750697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb
[   11.751223] flags: 0x200000000000000(node=0|zone=2)
[   11.751447] page_type: f5(slab)
[   11.751751] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.752164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.752475] page dumped because: kasan: bad access detected
[   11.752856] 
[   11.752987] Memory state around the buggy address:
[   11.753381]  ffff8881035ebe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.753750]  ffff8881035ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.754351] >ffff8881035ebf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.754750]                                                                 ^
[   11.755175]  ffff8881035ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.755432]  ffff8881035ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.756034] ==================================================================
[   11.706484] ==================================================================
[   11.707118] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0
[   11.707636] Read of size 1 at addr ffff8881035ebf73 by task kunit_try_catch/214
[   11.708480] 
[   11.708620] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.708667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.708679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.708700] Call Trace:
[   11.708713]  <TASK>
[   11.708729]  dump_stack_lvl+0x73/0xb0
[   11.708758]  print_report+0xd1/0x650
[   11.708783]  ? __virt_addr_valid+0x1db/0x2d0
[   11.708807]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.708828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.709027]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.709054]  kasan_report+0x141/0x180
[   11.709078]  ? ksize_unpoisons_memory+0x81c/0x9b0
[   11.709104]  __asan_report_load1_noabort+0x18/0x20
[   11.709125]  ksize_unpoisons_memory+0x81c/0x9b0
[   11.709146]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   11.709165]  ? finish_task_switch.isra.0+0x153/0x700
[   11.709190]  ? __switch_to+0x5d9/0xf60
[   11.709212]  ? dequeue_task_fair+0x156/0x4e0
[   11.709237]  ? __schedule+0x10cc/0x2b60
[   11.709261]  ? __pfx_read_tsc+0x10/0x10
[   11.709281]  ? ktime_get_ts64+0x86/0x230
[   11.709307]  kunit_try_run_case+0x1a5/0x480
[   11.709330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.709349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.709374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.709398]  ? __kthread_parkme+0x82/0x180
[   11.709420]  ? preempt_count_sub+0x50/0x80
[   11.709445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.709465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.709489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.709513]  kthread+0x337/0x6f0
[   11.709530]  ? trace_preempt_on+0x20/0xc0
[   11.709554]  ? __pfx_kthread+0x10/0x10
[   11.709573]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.709595]  ? calculate_sigpending+0x7b/0xa0
[   11.709616]  ? __pfx_kthread+0x10/0x10
[   11.709635]  ret_from_fork+0x41/0x80
[   11.709657]  ? __pfx_kthread+0x10/0x10
[   11.709675]  ret_from_fork_asm+0x1a/0x30
[   11.709705]  </TASK>
[   11.709717] 
[   11.720614] Allocated by task 214:
[   11.721030]  kasan_save_stack+0x45/0x70
[   11.721308]  kasan_save_track+0x18/0x40
[   11.721503]  kasan_save_alloc_info+0x3b/0x50
[   11.721694]  __kasan_kmalloc+0xb7/0xc0
[   11.722114]  __kmalloc_cache_noprof+0x189/0x420
[   11.722316]  ksize_unpoisons_memory+0xc7/0x9b0
[   11.722524]  kunit_try_run_case+0x1a5/0x480
[   11.722829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.723239]  kthread+0x337/0x6f0
[   11.723374]  ret_from_fork+0x41/0x80
[   11.723613]  ret_from_fork_asm+0x1a/0x30
[   11.724045] 
[   11.724155] The buggy address belongs to the object at ffff8881035ebf00
[   11.724155]  which belongs to the cache kmalloc-128 of size 128
[   11.724633] The buggy address is located 0 bytes to the right of
[   11.724633]  allocated 115-byte region [ffff8881035ebf00, ffff8881035ebf73)
[   11.725455] 
[   11.725623] The buggy address belongs to the physical page:
[   11.725871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035eb
[   11.726238] flags: 0x200000000000000(node=0|zone=2)
[   11.726463] page_type: f5(slab)
[   11.726625] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.726960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.727277] page dumped because: kasan: bad access detected
[   11.727515] 
[   11.728226] Memory state around the buggy address:
[   11.728445]  ffff8881035ebe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.729005]  ffff8881035ebe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.729330] >ffff8881035ebf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.729697]                                                              ^
[   11.730116]  ffff8881035ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.730473]  ffff8881035ec000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.730930] ==================================================================